Bugtraq mailing list archives

xlock clarification....


From: hedley () CS BRIS AC UK (David Hedley)
Date: Mon, 28 Apr 1997 13:30:08 +0100


Just to clarify the xlock problem for people (as I've received email
from several people who aren't sure if they're vulnerable or not). The
length of the parameter has to exceed 1024 bytes (as the buffer being
overflowed is 1024 characters). e.g. try: xlock -name xxxxx<insert 1000+x's>

Regards,

David
--
 David Hedley (hedley () cs bris ac uk)
 finger hedley () cs bris ac uk for PGP key
 Computer Graphics Group | University of Bristol | UK



Current thread: